2016
DOI: 10.1177/1548512916660637
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation

Abstract: This paper addresses the problem of trust in Modeling and Simulation (M&S) technologies, and uncertainty in applications to homeland security. The key goal of this paper is an extension of the notion of trusted M&S techniques for traveler risk assessment in mass-transit applications such as e-borders. Theories of uncertainty suggest that different understandings of uncertainty result in different mechanisms of its reduction. We show that a taxonomy of uncertainty that is accepted in philosophical studi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…• According to resent studies [49], [50], [91] using the biometric-enabled watchlists (Level IV) is imperative. This may, however, decrease the performance.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
See 2 more Smart Citations
“…• According to resent studies [49], [50], [91] using the biometric-enabled watchlists (Level IV) is imperative. This may, however, decrease the performance.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…In [39], the design goal is to minimize risks that "all the holes of a "Swiss Cheese" model do not line up". Some efforts to improve the performance of layered security have been reported with respect to: 1) topology of the waiting queuing lines [53] and checkpoint flow models [52]; 2) optimization of the passenger flows [64], [89]; 3) development of security measures [16], [78], including measures of the cost of travel time variability [24]; 4) cost-efficient minimization of security layers [77]; 5) modeling and simulation using a multi-state model of service [59], analytic hierarchy model [92] and hybrid models; for example, combining analytic hierarchy model and others, such as Dempster-Shafer [6], and Bayesian [58]; 6) traveler authentication and risk assessment, in particular, using multi-metric causal models [50], [91]; and cognitive agent models [45].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
See 1 more Smart Citation
“…This conceptual projection includes the following dimensions: Inference engine : Since the data about the persons of interest that is stored in the watchlist is often incomplete, uncertain, imperfect, fragmentary, and conflicting [2, 3], a powerful inference engine is needed at various phases of gathering, evidence accumulation, control, fusion, recognition, tracking in the surveillance network, as well as risk assessment and prediction. These inferences can be executed by Bayesian networks [18] and their extensions such as dynamic Bayesian networks, as well as methods for dealing with conflicting information [19], and deep learning techniques based on neural networks [20]. Technological components, including artificial intelligence and computational intelligence tools, should be developed, implemented, and deployed under fundamental social constraints and regulations. Social embedding : The watchlist utilises mechanisms for embedding in social infrastructure such as exploring various databases, local security resources, big data analysis, and possibilities of surveillance networks for identification and tracking. Interview supporting technology : Motivated by the fact that the traveller's cooperation is a crucial factor for improving the watchlist performance, the watchlist screening should be integrated into interview supporting machines – a well identified trend for deception detection as applied to e‐border infrastructure. Countermeasures : The watchlist can be vulnerable to attacks on its integrity.…”
Section: Introductionmentioning
confidence: 99%
“…Inference engine : Since the data about the persons of interest that is stored in the watchlist is often incomplete, uncertain, imperfect, fragmentary, and conflicting [2, 3], a powerful inference engine is needed at various phases of gathering, evidence accumulation, control, fusion, recognition, tracking in the surveillance network, as well as risk assessment and prediction. These inferences can be executed by Bayesian networks [18] and their extensions such as dynamic Bayesian networks, as well as methods for dealing with conflicting information [19], and deep learning techniques based on neural networks [20]. Technological components, including artificial intelligence and computational intelligence tools, should be developed, implemented, and deployed under fundamental social constraints and regulations.…”
Section: Introductionmentioning
confidence: 99%